Skip to main content
Log in

Building online trust through privacy practices

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

This study applies Mayer et al. [24] trust model to an Internet context. A model is presented linking privacy policy, through trustworthiness, to online trust, and then to customers’ loyalty and their willingness to provide truthful information. The model is tested using a sample of 269 responses. The findings suggest that consumers’ trust in a company is closely linked with the perception of the company’s respect for customer privacy. Trust in turn is linked to increased customer loyalty that can be manifested through increased purchases, openness to trying new products, and willingness to participate in programs that use additional personal information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anderson J.C. and Gerbing D.W. (1998). Structural equation modeling in practice: a review and recommended two-step approach. Psychol. Bull. 103(3): 411–423

    Article  Google Scholar 

  2. Bagozzi R.P. and Yi Y. (1988). On the evaluation of structural equation models. J. Acad. Mark. Sci. 16(1): 74–94

    Google Scholar 

  3. Bentler P.M. (1990). Comparative fit indexes in structural models. Psychol. Bull. 107(2): 238–246

    Article  Google Scholar 

  4. Bentler P.M. and Bonnet D.G. (1980). Significance tests and goodness-of-fit in the analysis of covariance structure. Psychol. Bull. 88(3): 588–606

    Article  Google Scholar 

  5. Byrne B.M. (1998). Structural Equation Modeling: Basic Concepts, Application and Programming. Lawrence Earlbaum Associated, Inc., Mahwah

    Google Scholar 

  6. Cavoukian A. and Hamilton T.J. (2002). Privacy Payoff: How Successful Businesses Build Customer Trust. McGraw–Hill Ryerson Limited, New York

    Google Scholar 

  7. Cohen J. and Cohen P. (1983). Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences, 2nd edn. Lawrence Erlbaum Associates, Hillsdale

    Google Scholar 

  8. Cronbach L.J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika 16: 297–334

    Article  Google Scholar 

  9. Culnan M.J. (1993). “How did they get my name?”: an exploratory investigation of consumer attitudes toward secondary information use. MIS Quart. 17(3): 341–361

    Article  Google Scholar 

  10. Culnan M.J. and Armstrong P.K. (1999). Information privacy concerns, procedural fairness and impersonal trust: an empirical investigation. Organ. Sci. 10(1): 104–115

    Article  Google Scholar 

  11. Davis J.H., Schoorman F.D., Mayer R.C. and Tan H.H. (2000). The trusted general manager and business unit performance: empirical evidence of a competitive advantage. Strateg. Manag. J. 21(5): 563–576

    Article  Google Scholar 

  12. Dinev T. and Hart P. (2006). An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1): 61–80

    Article  Google Scholar 

  13. Fornell C. and Larcker D.F. (1981). Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1): 39–50

    Article  Google Scholar 

  14. Gefen D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. Database Adv. Inf. Systems. 33(3): 38–53

    Google Scholar 

  15. Rayport J.F. and Hagel J. (1997). The coming battle for customer information. Harv. Bus. Rev. 75(1): 53–65

    Google Scholar 

  16. Hoffman D.L., Novak T.P. and Peralta M. (1999). Building consumer trust online. Commun. ACM 42(4): 80–85

    Article  Google Scholar 

  17. Hu L.T. and Bentler P.M. (1995). Evaluating model fit. In: Hoyle, R.H. (eds) Structural Equation Modeling: Concepts, Issues and Applications, pp 76–99. Sage, Thousand Oaks

    Google Scholar 

  18. Jarvenpaa S.L., Knoll K. and Leidner D.E. (1998). Is anybody out there? Antecedents of trust in global virtual teams. J. Manag. Inf. Syst. 14(4): 29–64

    Google Scholar 

  19. Joreskog K. and Sorbom D. (1993). LISREL VIII User’s Guide. Scientific Software, Inc., Mooresville

    Google Scholar 

  20. Kim W.C. and Mauborgne R. (1997). Fair process: managing in the knowledge economy. Harv. Bus. Rev. 75(4): 65–75

    Google Scholar 

  21. Kramer R.M. and Tyler T.R. (1996). Whither trust. In: Kramer, R.M. and Tyler, T.R. (eds) Trust in Organizations’ Frontiers of Theory and Research, pp 1–15. Sage Publications, Thousand Oaks

    Google Scholar 

  22. Liu C., Marchewka J.T., Lu J. and Yu C. (2005). Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 42(2): 289–304

    Article  Google Scholar 

  23. Mayer R.C. and Davis J.H. (1999). The effect of the performance appraisal system on trust for management: a field quasi-experiment. J. Appl. Psychol. 84(1): 123–136

    Article  Google Scholar 

  24. Mayer R.C., Davis J.H. and Schoorman F.D. (1995). An integration model of organizational trust. Acad. Manag. Rev. 20(3): 709–734

    Article  Google Scholar 

  25. McGraw, H. III: Managing the privacy revolution. Direct Mark. 61(12), 36–38, 60 (1999)

    Google Scholar 

  26. Meinert D.B., Peterson D.K., Criswell J.R. and Crossland M.D. (2006). Privacy policy statements and consumer willingness to provide personal information. J. Electron. Commer. Organ. 4(1): 1–17

    Google Scholar 

  27. Nunnally J.C. (1978). Psychometric Theory. McGraw–Hill, New York

    Google Scholar 

  28. Reichheld F.F. and Schefter P. (2000). E-loyalty: your secret weapon on the Web. Harv. Bus. Rev. 78(4): 105–113

    Google Scholar 

  29. Robertshaw G.S. and Marr N.E. (2006). The implications of incomplete and spurious personal information disclosures for direct marketing practice. J. Database Mark. Cust. Strategy Manag. 13(3): 186–197

    Article  Google Scholar 

  30. Schoorman F.D., Mayer R.C. and Davis J.H. (1996). Including versus excluding ability from the definition of trust. Acad. Manag. Rev. 21(2): 339–340

    Google Scholar 

  31. Segars A.H. (1997). Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research. Omega 25(1): 107–121

    Article  Google Scholar 

  32. Serva M.A., Benamati J. and Fuller M.A. (2005). Trustworthiness in B2C e-commerce: an examination of alternative models. Database Adv. Inf. Syst. 36(3): 89–108

    Google Scholar 

  33. Serva M.A., Fuller M.A. and Mayer R.C. (2005). The reciprocal nature of trust: a longitudinal study of interacting teams. J. Organ. Behav. 26(6): 625–648

    Article  Google Scholar 

  34. Smith H.J. (1993). Privacy policies and practices: inside the organizational maze. Commun. ACM 36(12): 105–122

    Article  Google Scholar 

  35. Smith K.B. (2002). Typologies, taxonomies and the benefits of policy classification. Policy Stud. J. 30(3): 379–395

    Article  Google Scholar 

  36. Solomon H. (2002). Privacy policies under fire. Comput. Can. 28(14): 1–6

    Google Scholar 

  37. Steiger, J.H., Lind, J.C.: Statistically based tests for the number of common factors. Paper presented at the Psychometric Society Annual Meeting, Iowa City, IA (1980)

  38. Tinsley D.B. (1996). Trust plus capabilities. Acad. Manag. Rev. 21(2): 335–337

    MathSciNet  Google Scholar 

  39. Urban G.L., Sultan F. and Qualls W.J. (2000). Placing trust at the center of your Internet strategy. MIT Sloan Manag. Rev. 42(1): 39–48

    Google Scholar 

  40. Zuboff S. and Maxmin J. (2002). The support economy. Penguin Books, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Thomas W. Lauer or Xiaodong Deng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lauer, T.W., Deng, X. Building online trust through privacy practices. Int. J. Inf. Secur. 6, 323–331 (2007). https://doi.org/10.1007/s10207-007-0028-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-007-0028-8

Keywords

Navigation